Secure pairing for wired or wireless communications devices

A kind of equipment and wireless technology, which is applied in the direction of wireless communication, security device, data exchange through path configuration, etc., to achieve the effect of improving the security level

Active Publication Date: 2007-08-08
SIGNIFY HLDG BV
View PDF0 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Many of the above-mentioned disadvantages of the pairing mechanism also exist in wired networks where the ma

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure pairing for wired or wireless communications devices
  • Secure pairing for wired or wireless communications devices
  • Secure pairing for wired or wireless communications devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Although the invention is described herein as being implemented in a wireless network, it should be understood that the invention is also applicable to wired networks in which a host device is directly or indirectly connected to a peripheral device through a cable or other physical connector.

[0021] Two electronic devices 10 and 20 shown in the block diagram of FIG. 1 form an ad hoc wireless network through wireless connection.

[0022] In the illustrated embodiment of the invention, the first electronic device 10 acts as a peripheral device and the second electronic device 20 acts as a master device. For example, the first electronic device 10 may be a portable memory device, a mobile phone hands-free set or a wireless network access point (such as a Wi-Fi access point), while the second electronic device 20 may be a camera, a mobile phone or a personal computer, The formed ad hoc wireless network enables data transmission from the first device 10 to the second devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Pairing is achieved between a host communications device and a peripheral communications device, in order to establish an ad hoc wireless or wired network. A device identification, relating uniquely to the peripheral device, is displayed on the host device. In order to accept the pairing, the user confirms that the device identification displayed on the host device matches that printed on the peripheral diwice, and then completes the pairing procedure by pressing a key on the peripheral device, or, if Near Field Communication (NFC) techniques are implemented in the devices, by placing the peripheral device in contact with, or sufficiently close to, the host device. Thus, secure pairing is achieved, without requiring a complex user interface on the peripheral device.

Description

field of invention [0001] The present invention relates to wired and wireless communication equipment, in particular, to a method and device for realizing secure pairing of wired or wireless communication equipment. technical background [0002] Ad hoc wireless networks, in which appropriately equipped wireless devices can communicate wirelessly with each other, avoid the need for cables to connect two devices. [0003] These devices need to be paired in order for two isolated wireless devices to communicate securely with each other and to avoid the possibility of a third party device detecting and / or tampering with data transmitted from one of the two devices. This pairing process involves the transfer and establishment of a "base of trust" information between the devices involved. The role of the "credible basis" information is to ensure that the device only communicates with the communication partner designated by the user as trusted (for example, because the user owns o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/28H04L12/56H04W12/06
CPCH04L9/32H04L41/28H04W12/04H04W12/06H04L63/08H04L63/0869H04W4/21H04W12/50
Inventor 马克·沃克莱尔哈维尔·塞雷特莱昂内尔·G.·艾蒂安菲利普·托伊文
Owner SIGNIFY HLDG BV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products